Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2023, 21:09
Behavioral task
behavioral1
Sample
4f46c5da50a2ceb8c78f0fc2739439d5c544fe6d0924d6f61ecd7c2453565efe.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4f46c5da50a2ceb8c78f0fc2739439d5c544fe6d0924d6f61ecd7c2453565efe.exe
Resource
win10v2004-20230831-en
General
-
Target
4f46c5da50a2ceb8c78f0fc2739439d5c544fe6d0924d6f61ecd7c2453565efe.exe
-
Size
15.4MB
-
MD5
e70b3364e3116ab6b74b3469f92b7d4b
-
SHA1
ad5500681da9b21288e75e2d5fffeca8b4209145
-
SHA256
4f46c5da50a2ceb8c78f0fc2739439d5c544fe6d0924d6f61ecd7c2453565efe
-
SHA512
d1db8b03568e1b5a0318c4744a070740d62f8849b756c81a8ed33d5511e57a40f76dfb3ab9065a681fe659fcf9406ea6e012eb03003ce5dc5e9cbc0f82469c96
-
SSDEEP
393216:K8Z5ubaquU3Ie1no4aHLup8f7A2yefA4KaxEUtN:K8ZIbMU3Z1J7ODR1fzKaXtN
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload 2 IoCs
resource yara_rule behavioral2/memory/1948-52-0x0000000010000000-0x000000001002A000-memory.dmp fatalrat behavioral2/memory/4704-104-0x0000000010000000-0x000000001002A000-memory.dmp fatalrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ PTvrst.exe -
Downloads MZ/PE file
-
resource yara_rule behavioral2/files/0x000a00000002313b-15.dat aspack_v212_v242 behavioral2/files/0x000a00000002313b-16.dat aspack_v212_v242 -
Executes dropped EXE 7 IoCs
pid Process 2236 sg.tmp 3692 w8.exe 3976 spolsvt.exe 1948 spolsvt.exe 5080 PTvrst.exe 4176 spolsvt.exe 4704 spolsvt.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000\Software\Wine PTvrst.exe -
resource yara_rule behavioral2/memory/1824-0-0x0000000000400000-0x0000000000572000-memory.dmp upx behavioral2/memory/1824-28-0x0000000000400000-0x0000000000572000-memory.dmp upx behavioral2/memory/1824-110-0x0000000000400000-0x0000000000572000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ϵͳ×é¼þ = "C:\\Users\\Public\\Documents\\123\\PTvrst.exe" spolsvt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Therecontinuous = "C:\\WINDOWS\\DNomb\\PTvrst.exe" PTvrst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ϵͳ×é¼þ = "C:\\Users\\Public\\Documents\\123\\PTvrst.exe" spolsvt.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5080 PTvrst.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3692 set thread context of 3976 3692 w8.exe 93 PID 3976 set thread context of 1948 3976 spolsvt.exe 94 PID 5080 set thread context of 4176 5080 PTvrst.exe 98 PID 4176 set thread context of 4704 4176 spolsvt.exe 99 -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\letsvpn-latest.exe sg.tmp File opened for modification C:\Program Files (x86)\letsvpn-latest.exe sg.tmp File created C:\Program Files (x86)\w8.exe sg.tmp File opened for modification C:\Program Files (x86)\w8.exe sg.tmp -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\DNomb\PTvrst.exe w8.exe File created C:\Windows\DNomb\spolsvt.exe w8.exe File created C:\Windows\DNomb\Mpec.mbt w8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 spolsvt.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz spolsvt.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 spolsvt.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz spolsvt.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000_Classes\Local Settings w8.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3692 w8.exe 3692 w8.exe 3692 w8.exe 3692 w8.exe 3692 w8.exe 3692 w8.exe 3692 w8.exe 3692 w8.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe 1948 spolsvt.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeBackupPrivilege 1824 4f46c5da50a2ceb8c78f0fc2739439d5c544fe6d0924d6f61ecd7c2453565efe.exe Token: SeRestorePrivilege 1824 4f46c5da50a2ceb8c78f0fc2739439d5c544fe6d0924d6f61ecd7c2453565efe.exe Token: 33 1824 4f46c5da50a2ceb8c78f0fc2739439d5c544fe6d0924d6f61ecd7c2453565efe.exe Token: SeIncBasePriorityPrivilege 1824 4f46c5da50a2ceb8c78f0fc2739439d5c544fe6d0924d6f61ecd7c2453565efe.exe Token: SeCreateGlobalPrivilege 1824 4f46c5da50a2ceb8c78f0fc2739439d5c544fe6d0924d6f61ecd7c2453565efe.exe Token: 33 1824 4f46c5da50a2ceb8c78f0fc2739439d5c544fe6d0924d6f61ecd7c2453565efe.exe Token: SeIncBasePriorityPrivilege 1824 4f46c5da50a2ceb8c78f0fc2739439d5c544fe6d0924d6f61ecd7c2453565efe.exe Token: 33 1824 4f46c5da50a2ceb8c78f0fc2739439d5c544fe6d0924d6f61ecd7c2453565efe.exe Token: SeIncBasePriorityPrivilege 1824 4f46c5da50a2ceb8c78f0fc2739439d5c544fe6d0924d6f61ecd7c2453565efe.exe Token: SeRestorePrivilege 2236 sg.tmp Token: 35 2236 sg.tmp Token: SeSecurityPrivilege 2236 sg.tmp Token: SeSecurityPrivilege 2236 sg.tmp Token: 33 1824 4f46c5da50a2ceb8c78f0fc2739439d5c544fe6d0924d6f61ecd7c2453565efe.exe Token: SeIncBasePriorityPrivilege 1824 4f46c5da50a2ceb8c78f0fc2739439d5c544fe6d0924d6f61ecd7c2453565efe.exe Token: SeDebugPrivilege 1948 spolsvt.exe Token: SeDebugPrivilege 1824 4f46c5da50a2ceb8c78f0fc2739439d5c544fe6d0924d6f61ecd7c2453565efe.exe Token: SeDebugPrivilege 4704 spolsvt.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3692 w8.exe 3692 w8.exe 3976 spolsvt.exe 3976 spolsvt.exe 5080 PTvrst.exe 5080 PTvrst.exe 4176 spolsvt.exe 4176 spolsvt.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1824 wrote to memory of 1796 1824 4f46c5da50a2ceb8c78f0fc2739439d5c544fe6d0924d6f61ecd7c2453565efe.exe 85 PID 1824 wrote to memory of 1796 1824 4f46c5da50a2ceb8c78f0fc2739439d5c544fe6d0924d6f61ecd7c2453565efe.exe 85 PID 1824 wrote to memory of 2236 1824 4f46c5da50a2ceb8c78f0fc2739439d5c544fe6d0924d6f61ecd7c2453565efe.exe 87 PID 1824 wrote to memory of 2236 1824 4f46c5da50a2ceb8c78f0fc2739439d5c544fe6d0924d6f61ecd7c2453565efe.exe 87 PID 1824 wrote to memory of 2236 1824 4f46c5da50a2ceb8c78f0fc2739439d5c544fe6d0924d6f61ecd7c2453565efe.exe 87 PID 1824 wrote to memory of 3692 1824 4f46c5da50a2ceb8c78f0fc2739439d5c544fe6d0924d6f61ecd7c2453565efe.exe 90 PID 1824 wrote to memory of 3692 1824 4f46c5da50a2ceb8c78f0fc2739439d5c544fe6d0924d6f61ecd7c2453565efe.exe 90 PID 1824 wrote to memory of 3692 1824 4f46c5da50a2ceb8c78f0fc2739439d5c544fe6d0924d6f61ecd7c2453565efe.exe 90 PID 3692 wrote to memory of 3976 3692 w8.exe 93 PID 3692 wrote to memory of 3976 3692 w8.exe 93 PID 3692 wrote to memory of 3976 3692 w8.exe 93 PID 3692 wrote to memory of 3976 3692 w8.exe 93 PID 3692 wrote to memory of 3976 3692 w8.exe 93 PID 3692 wrote to memory of 3976 3692 w8.exe 93 PID 3692 wrote to memory of 3976 3692 w8.exe 93 PID 3692 wrote to memory of 3976 3692 w8.exe 93 PID 3692 wrote to memory of 3976 3692 w8.exe 93 PID 3976 wrote to memory of 1948 3976 spolsvt.exe 94 PID 3976 wrote to memory of 1948 3976 spolsvt.exe 94 PID 3976 wrote to memory of 1948 3976 spolsvt.exe 94 PID 3976 wrote to memory of 1948 3976 spolsvt.exe 94 PID 3976 wrote to memory of 1948 3976 spolsvt.exe 94 PID 3976 wrote to memory of 1948 3976 spolsvt.exe 94 PID 3976 wrote to memory of 1948 3976 spolsvt.exe 94 PID 3976 wrote to memory of 1948 3976 spolsvt.exe 94 PID 5080 wrote to memory of 4176 5080 PTvrst.exe 98 PID 5080 wrote to memory of 4176 5080 PTvrst.exe 98 PID 5080 wrote to memory of 4176 5080 PTvrst.exe 98 PID 5080 wrote to memory of 4176 5080 PTvrst.exe 98 PID 5080 wrote to memory of 4176 5080 PTvrst.exe 98 PID 5080 wrote to memory of 4176 5080 PTvrst.exe 98 PID 5080 wrote to memory of 4176 5080 PTvrst.exe 98 PID 5080 wrote to memory of 4176 5080 PTvrst.exe 98 PID 5080 wrote to memory of 4176 5080 PTvrst.exe 98 PID 4176 wrote to memory of 4704 4176 spolsvt.exe 99 PID 4176 wrote to memory of 4704 4176 spolsvt.exe 99 PID 4176 wrote to memory of 4704 4176 spolsvt.exe 99 PID 4176 wrote to memory of 4704 4176 spolsvt.exe 99 PID 4176 wrote to memory of 4704 4176 spolsvt.exe 99 PID 4176 wrote to memory of 4704 4176 spolsvt.exe 99 PID 4176 wrote to memory of 4704 4176 spolsvt.exe 99 PID 4176 wrote to memory of 4704 4176 spolsvt.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f46c5da50a2ceb8c78f0fc2739439d5c544fe6d0924d6f61ecd7c2453565efe.exe"C:\Users\Admin\AppData\Local\Temp\4f46c5da50a2ceb8c78f0fc2739439d5c544fe6d0924d6f61ecd7c2453565efe.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c set2⤵PID:1796
-
-
C:\Users\Admin\AppData\Local\Temp\~6839522196131104433~\sg.tmp7zG_exe x "C:\Users\Admin\AppData\Local\Temp\4f46c5da50a2ceb8c78f0fc2739439d5c544fe6d0924d6f61ecd7c2453565efe.exe" -y -aoa -o"C:\Program Files (x86)\"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
-
C:\Program Files (x86)\w8.exe"C:\Program Files (x86)\\w8.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\DNomb\spolsvt.exeC:\Windows\DNomb\spolsvt.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Public\Documents\t\spolsvt.exeC:\Users\Public\Documents\t\spolsvt.exe4⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:948
-
C:\Users\Public\Documents\123\PTvrst.exe"C:\Users\Public\Documents\123\PTvrst.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\WINDOWS\DNomb\spolsvt.exeC:\WINDOWS\DNomb\spolsvt.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Users\Public\Documents\t\spolsvt.exeC:\Users\Public\Documents\t\spolsvt.exe3⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:4704
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.3MB
MD5291be48f62359b80b3774eb4699e0e79
SHA109e1ba3935cb3950160859584242aa1919cfd73c
SHA2567ccac89afb5c01a8b22e2d82cfe2293f169a2e963c2780e40008b588938975fa
SHA512e7fabc74a164b315bd91f3d793023139da8b85bbf02b68214d21ddedcdd8f9a8180a4b0c9db9210dd8891d2cd13ce970530f869a750d5b1057c296c5dba3b1a4
-
Filesize
474KB
MD507b63770097223abaa76c4c42a8b12ea
SHA1a7dcff1a8ecfed52a61111734029f12fccacc91d
SHA256ef664098b808bb6ec158ceedcf6144f438b0756199b0c86032934286082d1063
SHA512da866c9c342acfb9f96dac182c42f50238b13df261fe65cf7d0eeac9b21497784c9392e14e8c54d21364baed19452817647b769ec3df4e3207d4a295691ec585
-
Filesize
474KB
MD507b63770097223abaa76c4c42a8b12ea
SHA1a7dcff1a8ecfed52a61111734029f12fccacc91d
SHA256ef664098b808bb6ec158ceedcf6144f438b0756199b0c86032934286082d1063
SHA512da866c9c342acfb9f96dac182c42f50238b13df261fe65cf7d0eeac9b21497784c9392e14e8c54d21364baed19452817647b769ec3df4e3207d4a295691ec585
-
Filesize
715KB
MD57c4718943bd3f66ebdb47ccca72c7b1e
SHA1f9edfaa7adb8fa528b2e61b2b251f18da10a6969
SHA2564cc32d00338fc7b206a7c052297acf9ac304ae7de9d61a2475a116959c1524fc
SHA512e18c40d646fa4948f90f7471da55489df431f255041ebb6dcef86346f91078c9b27894e27216a4b2fe2a1c5e501c7953c77893cf696930123d28a322d49e1516
-
Filesize
1.2MB
MD5d22cfb5bfaeb1503b12b07e53ef0a149
SHA18ea2c85e363f551a159fabd65377affed4e417a1
SHA256260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360
SHA512151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45
-
Filesize
1.2MB
MD5d22cfb5bfaeb1503b12b07e53ef0a149
SHA18ea2c85e363f551a159fabd65377affed4e417a1
SHA256260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360
SHA512151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45
-
Filesize
16KB
MD5cdce4713e784ae069d73723034a957ff
SHA19a393a6bab6568f1a774fb753353223f11367e09
SHA256b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA5120a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f
-
Filesize
16KB
MD5cdce4713e784ae069d73723034a957ff
SHA19a393a6bab6568f1a774fb753353223f11367e09
SHA256b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA5120a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f
-
Filesize
16KB
MD5cdce4713e784ae069d73723034a957ff
SHA19a393a6bab6568f1a774fb753353223f11367e09
SHA256b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA5120a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f
-
Filesize
488KB
MD5429d8041db189592a97242a2010a5aeb
SHA1b07df03752608c60224fe9d9a332df760f289f8f
SHA25604a427c4d47dd8ca055ba01ff01b93a5decdf1105432164542d03c4c391adf8c
SHA512f4aecee6b79c0c9c73225ca126da7b72c701f90fb0b23fe97c31fe806eb739ffab75ee83b6ad57fc1d0ea9902126d176d3844c9c03107162efa8327a5ef8af22
-
Filesize
9KB
MD5523d5c39f9d8d2375c3df68251fa2249
SHA1d4ed365c44bec9246fc1a65a32a7791792647a10
SHA25620e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4
-
Filesize
9KB
MD5523d5c39f9d8d2375c3df68251fa2249
SHA1d4ed365c44bec9246fc1a65a32a7791792647a10
SHA25620e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4
-
Filesize
9KB
MD5523d5c39f9d8d2375c3df68251fa2249
SHA1d4ed365c44bec9246fc1a65a32a7791792647a10
SHA25620e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4